First published: Mon Dec 18 2023(Updated: )
### Impact _What kind of vulnerability is it? Who is impacted?_ Original Report: > The Oauth1/2 "state" and OpenID Connect "nonce" is vulnerable for a "timing attack" since it's compared via regular string > comparison (instead of `Yii::$app->getSecurity()->compareString()`). Affected Code: 1. OAuth 1 "state" https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth1.php#L158 3. OAuth 2 "state" https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OAuth2.php#L121 4. OpenID Connect "nonce" https://github.com/yiisoft/yii2-authclient/blob/0d1c3880f4d79e20aa1d77c012650b54e69695ff/src/OpenIdConnect.php#L420 ### Patches _Has the problem been patched? What versions should users upgrade to?_ TBD: Replace strcmp with `Yii::$app->getSecurity()->compareString()`). ### Workarounds _Is there a way for users to fix or remediate the vulnerability without upgrading?_ not as far as I see. ### References _Are there any links users can visit to find out more?_
Credit: security-advisories@github.com security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
composer/yiisoft/yii2-authclient | <=2.2.14 | 2.2.15 |
Yiiframework Yii2-authclient | <2.2.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-50708 is medium due to the potential for timing attacks on OAuth1/2 state and OpenID Connect nonce.
To fix CVE-2023-50708, upgrade yiisoft/yii2-authclient to version 2.2.15 or later.
CVE-2023-50708 affects all versions of yiisoft/yii2-authclient up to and including 2.2.14.
CVE-2023-50708 exposes applications to timing attacks that can compromise the security of OAuth and OpenID implementations.
There is no specific workaround for CVE-2023-50708; the recommended action is to upgrade the affected software.